Bing Mao
Bing Mao
Computer Science, Nanjing University
在 nju.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
DROP: Detecting return-oriented programming malicious code
P Chen, H Xiao, X Shen, X Yin, B Mao, L Xie
International Conference on Information Systems Security, 163-177, 2009
2642009
Role-based access control model for CSCW systems
C Li, Y Zhan, B Mao, L Xie
RUAN JIAN XUE BAO 11 (7), 931-937, 2000
79*2000
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware
Y Zhongyang, Z Xin, B Mao, L Xie
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
702013
Detecting code reuse in android applications using component-based control flow graph
X Sun, Y Zhongyang, Z Xin, B Mao, L Xie
IFIP international information security conference, 142-155, 2014
682014
JITDefender: A defense against JIT spraying attacks
P Chen, Y Fang, B Mao, L Xie
IFIP International Information Security Conference, 142-153, 2011
582011
AutoPaG: towards automated software patch generation with source code root cause identification and repair
Z Lin, X Jiang, D Xu, B Mao, L Xie
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
582007
Automatic construction of jump-oriented programming shellcode (on the x86)
P Chen, X Xing, B Mao, L Xie, X Shen, X Yin
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
482011
设计计算机辅助协同工作系统的几个关键技术
茅兵, 杜兴, 谢立
计算机研究与发展 33 (4), 241-247, 1996
46*1996
Efficient detection of the return-oriented programming malicious code
P Chen, X Xing, H Han, B Mao, L Xie
International Conference on Information Systems Security, 140-155, 2010
452010
访问控制研究综述
赵亮, 茅兵, 谢立
计算机工程 30 (2), 1-2, 2004
45*2004
System call redirection: A practical approach to meeting real-world virtual machine introspection needs
R Wu, P Chen, P Liu, B Mao
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
442014
Understanding the reproducibility of crowd-reported security vulnerabilities
D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang
27th {USENIX} Security Symposium ({USENIX} Security 18), 919-936, 2018
412018
Textlogger: inferring longer inputs on touch screen using motion sensors
D Ping, X Sun, B Mao
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
412015
Brick: A binary tool for run-time detecting and locating integer-based vulnerability
P Chen, Y Wang, Z Xin, B Mao, L Xie
2009 International Conference on Availability, Reliability and Security, 208-215, 2009
392009
A practical approach for adaptive data structure layout randomization
P Chen, J Xu, Z Lin, D Xu, B Mao, P Liu
European Symposium on Research in Computer Security, 69-89, 2015
352015
JITSafe: a framework against Just-in-time spraying attacks
P Chen, R Wu, B Mao
IET Information Security 7 (4), 283-292, 2013
342013
Detection, classification and characterization of android malware using api data dependency
Y Li, T Shen, X Sun, X Pan, B Mao
International Conference on Security and Privacy in Communication Systems, 23-40, 2015
322015
Detect android malware variants using component based topology graph
T Shen, Y Zhongyang, Z Xin, B Mao, H Huang
2014 IEEE 13th international conference on trust, security and privacy in …, 2014
322014
A DAG-based security policy conflicts detection method
Y Jian, M Bing, X Li
Journal of Computer Research and Development 42 (7), 1108, 2005
302005
一种基于有向图模型的安全策略冲突检测方法
姚键, 茅兵, 谢立
计算机研究与发展 42 (7), 1108, 2005
282005
系统目前无法执行此操作,请稍后再试。
文章 1–20